Internet of Things (IoT) Protocols: Quick Summary

Internet of Things (IoT) refers to the collection of IT-enabled products connected smartly. One application of IoT is the management of traffic signals based on the density of vehicles on the road. Here, we are not going to discuss IoT applications in detail. This article will summarize the major IoT protocols responsible for enabling different products to connect and performed requisite functions. Click Here If you are interested to learn Top 25 IoT Security Tools.

Major protocols:

(1) Message Queue Telemetry Transport (MQTT) Protocol

  • Lightweight protocol
  • Publish-subscribe-based messaging protocol
  • Three components: subscriber, publisher, and broker
  • Publisher transfers information to the subscriber while broker lies between them to check the integrity and authorization of both components.
  • Helps in managing IoT devices remotely by collecting information about installed gadgets and devices
  • High power consumption (as TCP based)

(2) Constrained Application Protocol (CoAP)

  • Defined in RFC 7252
  • Based on HTTP protocol
  • Client-server model
  • Defines four types of messages: Confirmable, Non-confirmable, Acknowledgement, Reset.
  • Messages exchanged over UDP.

(3) Advanced Message Queuing Protocol (AMQP)

  • Application layer protocol for message-oriented middleware environments
  • Provides end to end encryption
  • Wire level protocol
  • Provided reliability and security in transferring messages

(4) Data Distribution Service (DDS)

  • Developed by the Object Management Group (OMG)
  • Implements publish-subscribe pattern for exchanges messages
  • Two main layers: Data-Centric Publish-Subscribe (DCPS; delivers information to subscribers) and Data-Local Reconstruction Layer (DLRL; interface to DCPS)

Conclusion

Other IoT protocols include 6LowPAN, IPv4/IPv6, RPL, EPC, uCode, IPv6, URIs, Wifi, Bluetooth, LPWAN, mDNS, DNS-SD, Node, TR-069, OMA-DM, JSON-LD, Alljoyn, IoTivity, Weave, Homekit, and many others, which helps IoT devices in proper functioning and achieve the intended task.

Subscribe us to receive more such articles updates in your email.

If you have any questions, feel free to ask in the comments section below. Nothing gives me greater joy than helping my readers!

Disclaimer: This tutorial is for educational purpose only. Individual is solely responsible for any illegal act.

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *

OWASP API Top 10 - 2023 7 Facts You Should Know About WormGPT OWASP Top 10 for Large Language Models (LLMs) Applications Top 10 Blockchain Security Issues What is Cyber Warfare?